Remove Article Remove Education Remove Healthcare Remove Security
article thumbnail

Security Affairs newsletter Round 292

Security Affairs

Every week the best security articles from Security Affairs free for you in your email box. The post Security Affairs newsletter Round 292 appeared first on Security Affairs. A new round of the weekly SecurityAffairs newsletter arrived! Pierluigi Paganini. SecurityAffairs – hacking, newsletter).

article thumbnail

FINLAND: PARLIAMENT APPROVES NEW ACT ON THE SECONDARY USE OF SOCIAL AND HEALTH CARE PERSONAL DATA

DLA Piper Privacy Matters

The Act complements the GDPR and introduces reinforced data security requirements and strict authorization procedures. The license may be applied for educational, information management as well as innovation and development activities going beyond traditional research purposes reflected under GDPR 89 article.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

California law also requires businesses that suffer a breach of security to disclose the breach to consumers, and in some instances law enforcement, if sensitive information is compromised. race, religion, sexual orientation, gender identity, gender expression, age, etc.);

Privacy 58
article thumbnail

Requirements of a DPO in health and social care

IT Governance

The Pharmaceutical Services Negotiating Committee (PSNC) and the National Pharmacy Association (NPA) lobbied unsuccessfully to preclude some organisations, including smaller pharmacies. A comprehensive overview of the DPO’s tasks are outlined in Article 39 of the GDPR. The appointment of a DPO has been a hot topic among primary care.

GDPR 53
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. Technology Security.